{"id":"CVE-2023-24269","details":"An arbitrary file upload vulnerability in the plugin upload function of Textpattern v4.8.8 allows attackers to execute arbitrary code via a crafted Zip file.","modified":"2026-04-12T07:25:30.893779Z","published":"2023-04-28T22:15:08.887Z","references":[{"type":"EVIDENCE","url":"https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/textpattern/textpattern","events":[{"introduced":"0"},{"last_affected":"b90acf00e63e2be98f81e1cde58a5bea4b31dee9"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:textpattern:textpattern:4.8.8:-:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"4.8.8-NA"}]}}],"versions":["4.2.0","4.3.0","4.4.0","4.4.1","4.5.0","4.5.1","4.5.2","4.6.0","4.6.0-beta","4.6.0-beta.2","4.6.0-beta.3","4.7.0","4.7.0-beta","4.7.0-beta.2","4.7.0-beta.3","4.7.0-rc.1","4.7.2","4.8.0-beta.2","4.8.1","4.8.2","4.8.3","4.8.4","4.8.5","4.8.6","4.8.7","4.8.8","4.8.8-beta.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-24269.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}